vulnerability
Oracle Linux: CVE-2021-23017: ELSA-2021-2290: nginx:1.16 security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | 05/25/2021 | 06/09/2021 | 12/24/2024 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
05/25/2021
Added
06/09/2021
Modified
12/24/2024
Description
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Solution(s)
oracle-linux-upgrade-nginxoracle-linux-upgrade-nginx-all-modulesoracle-linux-upgrade-nginx-filesystemoracle-linux-upgrade-nginx-mod-http-image-filteroracle-linux-upgrade-nginx-mod-http-perloracle-linux-upgrade-nginx-mod-http-xslt-filteroracle-linux-upgrade-nginx-mod-mailoracle-linux-upgrade-nginx-mod-stream

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.